100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity Fundamentals Training Exam Questions And 100% Correct Answers.

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
29-09-2024
Written in
2024/2025

What does IP stand for? - Answer Internet Protocol What does IP do? - Answer Provides addressing What does TCP stand for? - Answer Transmission control Protocol Physical devices such as transceivers, modems, CSU/DSU are part of what network layer? - Answer Layer 1 What layer do MAC addresses operate on? - Answer The data link layer or layer 2 What 3 things happen on layer 3 of the OSI and TCP/IP network models? - Answer a.)Network provides connectivity between two hosts on geographically separated networks b.)selects the best path for data delivery c.)routes data packets True or False: DHCP snooping can mitigate a DHCP attack. - Answer True: DHCP snooping can mitigate a DHCP attack by using a Cisco switch. After encryption has been applied to a message, what is the message identified as? - Answer Ciphertext What does policy NAT - Answer It enables a firewall to perform translations based on a destination address

Show more Read less
Institution
Cyber Security Fundamentals
Course
Cyber Security Fundamentals










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security Fundamentals
Course
Cyber Security Fundamentals

Document information

Uploaded on
September 29, 2024
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

Cybersecurity Fundamentals Training
Exam Questions And 100% Correct
Answers.
What does IP stand for? - Answer Internet Protocol



What does IP do? - Answer Provides addressing



What does TCP stand for? - Answer Transmission control Protocol



Physical devices such as transceivers, modems, CSU/DSU are part of what network layer? - Answer
Layer 1



What layer do MAC addresses operate on? - Answer The data link layer or layer 2



What 3 things happen on layer 3 of the OSI and TCP/IP network models? - Answer a.)Network provides
connectivity between two hosts on geographically separated networks

b.)selects the best path for data delivery

c.)routes data packets



True or False: DHCP snooping can mitigate a DHCP attack. - Answer True: DHCP snooping can mitigate a
DHCP attack by using a Cisco switch.



After encryption has been applied to a message, what is the message identified as? - Answer
Ciphertext



What does policy NAT - Answer It enables a firewall to perform translations based on a destination
address

,what type of NAT is used for setting up public servers with a one to one relationship? - Answer Static
NAT



what type of cypher arranges or permutates letters? - Answer transposition



what is the type of malware masquerading as a legitimate software, but is malicious when launched? -
Answer trojan



What can be used to determine the type of OS the device is running that can be found within ICMP? -
Answer TTL value



On a multi-layer switch what does the TCAM table do? - Answer this table handles the fowarding of
data with regards to ACLs



The CAM table and the MAC table do what? - Answer identify a MAC address to a port



what is the preferred symmetrical algorithm to replace 3DES? - Answer AES



which OSI model layer is responsible for logical addressing and path selection networks? - Answer
Layer 3



Which form of NAT uses port addresses to distinguish between translated sessions? - Answer Dynamic
PAT , PATs always use ports



What utility can an attacker use to scan the a network in stealth mode? - Answer nmap



what phase of the TCP process is affected by a TCP reset attack? - Answer connection established. the
reset is the part when the communication is being shut down so the attack would falsify a TCP reset
which would cause the connection established phase to drop.



During a TCP SYN flood attack, what phase of the TCP communication process is attacked? - Answer
three-way handshake

, What protocol uses UDP to manage and monitor devices the could be exploited if not secured? - Answer
SNMP ( this is dead :security is not my problem)



What is the well known port of the DNS TCP zone-transfer? - Answer 53



How many bits does an IPv6 address have? - Answer 128



what is the first standard for Spanning Tree that was modeled after Radia Perlmans work while at DEC? -
Answer 802.1D "I have never seen a graph as lovely as a tree"-Radia Perlmans. 802.1D is the first
instance of Spanning Tree



What is the name of Layer 3 of the TCP/ IP model? - Answer The Internet layer



Which field in the IP header is decremented by every router it passes through? - Answer TTL



What TCP port does SSL/ TLS commonly use? - Answer TCP 443



Name the key difference between a MITM attack and an eavesdropping attack. - Answer MITM can
capture data AND can modify the data in transit



Which routing protcol is EIGRP? - Answer advanced distance vector, distance vector is for IGRP



Why would you use a hash algorithm for a message? - Answer Integrity. It guarantees data is not being
modified in transit



what device operates strictly at the physical layer? - Answer Hub



what does "key space" refer to in regards to cryptography? - Answer the number of possible keys
generated by an algorithm

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TestSolver9 Webster University
View profile
Follow You need to be logged in order to follow users or courses
Sold
751
Member since
2 year
Number of followers
124
Documents
24581
Last sold
4 days ago
TESTSOLVER9 STORE

TOPNOTCH IN LEARNING MATERIALS,(EXAMS,STUDYGUIDES NOTES ,REVIEWS,FLASHCARDS ,ALL SOLVED AND PACKAGED.OUR STORE MAKE YOUR EDUCATION JOURNEY EFFICIENT AND EASY.WE ARE HERE FOR YOU FEEL FREE TO REACH US OUT .

3.6

130 reviews

5
58
4
19
3
22
2
9
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions